EasyManua.ls Logo

ZyXEL Communications 310 - Authentication Policy; Overview; What You Can Do in this Chapter; What You Need to Know

ZyXEL Communications 310
562 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZyWALL 110/310/1100 Series User’s Guide 253
CHAPTER 18
Authentication Policy
18.1 Overview
Use authentication policies to control who can access the network. After a user passes
authentication the user’s computer must meet the endpoint security object’s Operating System
(OS) option and security requirements to gain access.
In the following figure the ZyWALL’s authentication policy requires endpoint security checking on
local user A. A passes authentication and the endpoint security check and is given access. Local
user B passes authentication but fails the endpoint security check and is denied access.
Figure 149 Authentication Policy Using Endpoint Security
18.1.1 What You Can Do in this Chapter
Use the Configuration > Auth. Policy screens (Section 18.2 on page 254) to create and manage
authentication policies.
18.1.2 What You Need to Know
Authentication Policy and VPN
Authentication policies are applied based on a traffic flow’s source and destination IP addresses. If
VPN traffic matches an authentication policy’s source and destination IP addresses, the user must
pass authentication.

Table of Contents

Related product manuals